Chapter 1 Flashcards
Keeping data, software, and hardware secure against unauthorized access, use, disclosure, disruption, modification, or destruction.
Information Security
The requirements that are set forth by laws and industry regulations
Compliance
C.I.A.
Confidentiality
Integrity
Availability
Allowing only those authorized to access the data requested
Confidentiality
Keeping data unaltered by Accidental or Malicious intent
Integrity
The ability to access data when needed
Availability
The physical disposition of the media on which the data is stored
Possession/Control
Allows you to say whether you’ve attributed the data in question to the proper owner or creator
Authenticity
How useful the data is
Utility
Attacks that allow unauthorized users to access your data, applications, or environments, and are primarily an attack against confidentiality
Interception
Attacks that cause our assets to become unusable or unavailable for our use, on a temporary or permanent basis.
Interruption
Attacks that involve tempering with assets.
Modification
Attacks that involve generating data, processes, communications, or other similar activities with a system.
Fabrication
The likelihood that an event will occur
Risk
Events that could cause damage to assets
Threats
A weakness that a threat event of the threat agent can take advantage of
Vulnerabilities